Sciweavers

6574 search results - page 37 / 1315
» Current Signatures: Application
Sort
View
AIM
2010
13 years 8 months ago
An Analysis of Current Trends in CBR Research Using Multi-View Clustering
The European Conference on Case-Based Reasoning (CBR) in 2008 marked 15 years of international and European CBR conferences where almost seven hundred research papers were publish...
Derek Greene, Jill Freyne, Barry Smyth, Pád...
EUROCRYPT
2006
Springer
14 years 2 months ago
Simplified Threshold RSA with Adaptive and Proactive Security
We present the currently simplest, most efficient, optimally resilient, adaptively secure, and proactive threshold RSA scheme. A main technical contribution is a new rewinding stra...
Jesús F. Almansa, Ivan Damgård, Jespe...
EUROCRYPT
2007
Springer
14 years 2 months ago
Batch Verification of Short Signatures
Abstract. With computer networks spreading into a variety of new environments, the need to authenticate and secure communication grows. Many of these new environments have particul...
Jan Camenisch, Susan Hohenberger, Michael Ø...
ATC
2007
Springer
14 years 4 months ago
Identity-Based Proxy Signature from Pairings
A proxy signature scheme allows an entity to delegate its signing capability to another entity (proxy) in such a way that the proxy can sign messages on behalf of the delegator. Pr...
Wei Wu, Yi Mu, Willy Susilo, Jennifer Seberry, Xin...
PKC
2009
Springer
166views Cryptology» more  PKC 2009»
14 years 11 months ago
Security of Blind Signatures under Aborts
We explore the security of blind signatures under aborts where the user or the signer may stop the interactive signature issue protocol prematurely. Several works on blind signatur...
Dominique Schröder, Marc Fischlin